Showing 141-150 from 241
...website in question - thus exposing the machine to attack. Selecting this option blocks the activity of the virus but does not generate an alert (Default = Disabled). Suppress Firewall alerts if password protection is enabled - If selected, no Firewall Alerts are displayed when password protection is enabled. Parents and network admins may want to enable this setting if they do not want...
http://help.comodo.com/topic-72-1-284-3041-Parental-Control-Settings.html...blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types of threats it has stopped, which can include advertising networks, 3rd party trackers...
http://help.comodo.com/topic-72-1-522-6228-CIS-Premium-–-Installation.html...blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types of threats it has stopped, which can include advertising networks, 3rd party trackers...
http://help.comodo.com/topic-72-1-451-4691-CIS-Complete---Installation-and-Activation.html...blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types of threats it has stopped, which can include advertising networks, 3rd party trackers...
http://help.comodo.com/topic-72-1-451-4690-CIS-Pro---Installation-and-Activation.html...blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types of threats it has stopped, which can include advertising networks, 3rd party trackers...
http://help.comodo.com/topic-72-1-451-4689-CIS-Premium-–-Installation.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your server. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-213-1-517-6062-Blocking-any-Downloads-of-a-Specific-File-Type.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-72-1-284-3070-Blocking-Any-Downloads-of-a-Specific-File-Type.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-72-1-522-6358-Block-Any-Downloads-of-a-Specific-File-Type.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-72-1-623-7665-Block-Any-Downloads-of-a-Specific-File-Type.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-72-1-451-4811-Blocking-Any-Downloads-of-a-Specific-File-Type.html